On Tue 2019-06-25 22:35:44 +0200, Moritz Mühlenhoff wrote:
> Buster still has 2.0.10, what's the plan for it
I've just filed https://bugs.debian.org/931126 to unblock for buster.
> (and for stretch), should we fix this in older releases?
Given that we're updating thunderbird in stable, yes, we s
On Fri, May 24, 2019 at 09:49:54AM +0200, Salvatore Bonaccorso wrote:
> Source: enigmail
> Source-Version: 2:2.0.11+ds1-1
>
> On Wed, May 22, 2019 at 02:25:42PM +0200, Salvatore Bonaccorso wrote:
> > Source: enigmail
> > Version: 2:2.0.10+ds1-1
> > Severity: important
> > Tags: security upstream
>
Source: enigmail
Source-Version: 2:2.0.11+ds1-1
On Wed, May 22, 2019 at 02:25:42PM +0200, Salvatore Bonaccorso wrote:
> Source: enigmail
> Version: 2:2.0.10+ds1-1
> Severity: important
> Tags: security upstream
> Forwarded: https://sourceforge.net/p/enigmail/bugs/983/
>
> Hi,
>
> The following v
Source: enigmail
Version: 2:2.0.10+ds1-1
Severity: important
Tags: security upstream
Forwarded: https://sourceforge.net/p/enigmail/bugs/983/
Hi,
The following vulnerability was published for enigmail.
CVE-2019-12269[0]:
| Enigmail before 2.0.11 allows PGP signature spoofing: for an inline
| PGP
4 matches
Mail list logo